Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Computer Fraud and Abuse Act

Encyclopedia of Information Technology Curriculum Integration
The federal Computer Fraud and Abuse Act, 18, (USC1030) (CFAA) of 1986, created and passed by Congress to reduce the hacking incidence of computer systems. It was last updated as part of the Patriot Act in 2001, raising penalties, increasing jail time, expanding the definition of loss, and making it easier to show damage Organizations can make use of CFAA against employees who wrongfully use data that was on their computer systems, for example, to give to competitors, or start a business. The CFAA is a federal statute which authorizes penalties, terms of imprisonment, and civil actions.
Published in Chapter:
Combating Computer Fraud
Steve Brown (Capella University, USA)
Copyright: © 2008 |Pages: 6
DOI: 10.4018/978-1-59904-881-9.ch019
Abstract
Money is to be made with computer fraud. While this statement seems to be shocking, it is nonetheless a very real indication of the seriousness of the nature. As we are becoming more dependent on technology for our information and convenience, and the lack of process being made in stopping computer fraud, we are increasing the risk we place on ourselves. Computer fraud is often perpetuated by computer professionals who have an understanding of information technology. They have an advantage over the normal computer user, and due to the anonymous nature of the Internet, it is often difficult to catch and try suspects (Lynch, 2003).
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Online Activism to Cybercrime
This 1986 Act serves as a modification to existing laws seeking to address issues of deception within the cyber realm. Computer users must receive proper authorization and must not exceed boundaries of authorization.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR